UCF STIG Viewer Logo

The .rhosts file must not be supported in PAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11989 GEN002100 SV-45169r1_rule Medium
Description
.rhosts files are used to specify a list of hosts permitted remote access to a particular account without authenticating. The use of such a mechanism defeats strong identification and authentication requirements.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42514r1_chk )
Check the PAM configuration for rhosts_auth.

Example:
# grep rhosts_auth /etc/pam.d/*

If a rhosts_auth entry is found, this is a finding.
Fix Text (F-38567r1_fix)
Edit the file(s) in /etc/pam.d referencing the rhosts_auth module, and remove the references to the rhosts_auth module.